Recent Posts by Jesse Amos

Monetizing the IoT

It’s estimated that there will be 26 billion connected devices in homes and businesses by 2020 and that the Internet of Things (IoT) has a potential economic impact of up to $11.1 trillion a year by 2025. Although still in its infancy stage, connected devices are becoming the new normal, and the IoT is already proving to have a significant impact on the creation of new products and services across verticals such as telecom, transportation and health care.

As IoT adoption continues to increase over the next few years, new opportunities will arise for companies to track and measure how customers are consuming products and services. Companies looking to generate revenue from the IoT will need to transform the information from smart, connected products into services by offering the entire product as a service, or using the product’s data stream to engage customers with additional services.

Read More

A Culture of Continuous Learning


The digital age has transformed every aspect of corporate processes, and corporate learning is no exception. We have mobile apps, social media, and online courses to help us achieve just-in-time learning when we identify a gap in knowledge at work or in our personal lives. Companies everywhere face the challenge of training and reskilling their workforces to keep pace with technological change, business disruption, and global competition.

Yet the traditional approach to learning, accomplished through classroom training, has been transitioning quickly to more cost-effective and real-time learning methods. This transition is crucial in enabling employees to learn new technologies at the rapid pace that vendors deliver them by, along with associated skills, such as data analysis.

Additionally, Millennials, the largest workforce demographic today, are demanding new methods for learning that center on social collaboration, video, and mobile apps. Corporate learning departments are determining how and where to blend face-to-face learning with digital learning methods.

Read More

Cloud Planning, Design and Optimization with Burstorm

 

 

Cloud is quickly becoming an IT “religion” with many designers and thought leaders claiming their choice is the best.   As the next infrastructure strategy is planned, there are thousands of potential providers across tens of thousands of locations creating trillions of potential combinations in the global market today.   

Read More

Security Threats: 5 Common Network Blind Spots

Enterprise networks are changing at a rapid pace – becoming more complex as next-generation advancements transform traditional architectures. Simultaneously, enterprises of all kinds and across all industries are coming to the sobering conclusion that with these changes, the traditional approach to cybersecurity is no longer effective.
 
Perimeter defenses, while still necessary, are no longer sufficient in the face of this once inconceivable, but now irrefutable, reality: Breaches will occur. Where cyber attacks of the past were intentionally grandiose and overt, today's attackers more often prefer to move low and slow, creating command and control channels through which to steal valuable information over long periods of time while remaining undetected.
 

With these changes a new security paradigm is emerging, one that charges security and network professionals not only with keeping threats out, but also with gaining and maintaining visibility over what's already inside their networks; however, the increasing complexity of networks creates blind spots that make seeing these threats more difficult than ever. What's more, these blind spots are caused by a number of factors and often create bottlenecks that can degrade network performance.

Read More

Subscribe Here!